Application Control Application Control

Browse the Fortiguard Labs extensive encyclopedia of applications. Click any title to view more details of the application. Can't find what you are looking for? Try using the search bar above to find a specific application description.

This indicates an attempt to send an N-CREATE request command via DICOM.Digital Imaging and Communications in Medicine (DICOM)...

Jan 25, 2013 RISK: POPULARITY:
This indicates an attempt to send an N-GET request command via DICOM.Digital Imaging and Communications in Medicine (DICOM) is...

Jan 25, 2013 RISK: POPULARITY:
This indicates an attempt to use the RIPng protocol.Routing Information Protocol next generation (RIPng) is the routing protocol...

Nov 03, 2011 RISK: POPULARITY:
This indicates an attempt to use the OUCH protocol.The OUCH protocol is composed of logical messages passed between an OUCH host...

Aug 17, 2011 RISK: POPULARITY:
This indicates an attempt to use the OWAMP Control protocol.The One-Way Active Measurement Protocol (OWAMP) is used to determine...

Aug 10, 2011 RISK: POPULARITY:
This indicates an attempt to use the RMI-IIOP protocol.RMI over IIOP (RMI-IIOP) is a protocol which delivers Common Object Request...

Jan 20, 2011 RISK: POPULARITY:
This indicates an attempt to access klogind.Klogind is the server for the rlogin program. The server is based on rlogind but uses...

Jan 15, 2009 RISK: POPULARITY:
This indicates an attempt to use the CRTP protocol.CRTP is the acronym for Combat Radio Transport Protocol. It has the ID number...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the NAT-PMP protocol.The NAT Port Mapping Protocol (NAT-PMP) is a network protocol used to establish...

Sep 08, 2017 RISK: POPULARITY:
This indicates an attempt to send an N-ACTION request command via DICOM. Digital Imaging and Communications in Medicine (DICOM)...

Jan 25, 2013 RISK: POPULARITY:
This indicates an attempt to use the BICC protocol.The Bearer-Independent Call Control (BICC) is a signaling protocol based on...

Aug 08, 2012 RISK: POPULARITY:
This indicates an attempt to use the S1AP protocol.S1 Application Protocol (S1AP) provides signalling service between E-UTRAN...

Jul 20, 2012 RISK: POPULARITY:
This indicates an attempt to use the Diameter protocol.Diameter is an authentication, authorization and accounting protocol for...

Aug 17, 2011 RISK: POPULARITY:
This indicates an attempt to use the MSRPC protocol with user-specified UUIDs.Microsoft Remote Procedure Call (MSRPC) is Microsoft's...

Jan 15, 2009 RISK: POPULARITY:
This indicates detection of IPv6 Fragment header packets.IPv6 Fragment header (IPv6-Frag) is used by the IPv6 source to send a...

Jan 13, 2009 RISK: POPULARITY: